Lotus Security Handbook

Vytisknout článek

O draftu tohoto dokumentu jsme zde již psali. Nyní vám přinášíme finální verzi dokumentu věnovaného budování bezpečné infrastruktury na technologiích IBM Lotus Software.

Originální rešerše

This IBM Redbook provides best practices and guidance for building a secure collaboration infrastructure utilizing IBM Lotus technologies. It is the third Lotus security oriented Redbook to be published. However, unlike the previous two Redbooks in this series, “The Domino Defense: Security in Lotus Notes 4.5 and the Internet” (SG24-4848) and “Lotus Notes and Domino R5.0 Security Infrastructure Revealed” (SG24-5341), this third book focuses not just on Notes/Domino - but on all IBM Lotus collaborative products, as well as general security best practices for any infrastructure. This book should be considered essential reading for anyone responsible for Lotus technology based applications, systems, and infrastructures.

The book is broken into four main parts:
Part 1 introduces the basic concepts related to security, and then covers a number of methodologies for architecting and deploying security from beginning to end in an organization.
Part 2 delves into the specific concepts and components involved in a secure infrastructure. This includes discussions about security zoning, single sign-on (SSO), public key infrastructures (PKI), and directory strategies.
Part 3 discusses the specific security features in the latest versions of Lotus products. Detailed security features of Lotus Notes and Domino 6, Sametime 3, QuickPlace 2.08, Domino Web Access (iNotes), WebSphere Portal, and other IBM/Lotus collaborative technologies are all discussed.
Part 4 provides a real-life scenario demonstrating the secure implementation of Lotus collaborative technologies, following the guidelines and best practices provided in the first three parts of this Redbook.

It is assumed that the reader has a good understanding of the basic concepts involved with the Lotus Notes and Domino security model and a basic understanding of the principles of IT security. For a general overview of Notes and Domino security, the reader can refer to the IBM Redbook, “Lotus Notes and Domino R5.0 Security Infrastructure Revealed” (SG24-5341), available for download at:


Part 1. Security concepts introduced
Chapter 1. Fundamentals of IT security
Chapter 2. Security methodologies
Part 2. Building a secure infrastructure
Chapter 3. Secure infrastructure requirements
Chapter 4. Security components and layers
Chapter 5. Proxies
Chapter 6. Public key infrastructures
Chapter 7. Single sign-on
Chapter 8. Directory strategies
Chapter 9. Server hardening
Part 3. Security features of Lotus products
Chapter 10. The Notes/Domino security model
Chapter 11. Domino/Notes 6 security features
Chapter 12. Security features of other Lotus products
Part 4. A secure scenario
Chapter 13. Sample scenario described
Chapter 14. Scenario implementation details
Appendix A. Debugging with a protocol analyzer
Appendix B. A sample DSAPI program
Appendix C. Domino 6 HTTP plug-in hints and tips

Redbook čítající 706 stran ve formátu PDF najdete zde (8,1 MB).

Autor: Emil Čelustka
Datum: 30.07.2004

Sdílet článek Seznam komentářů

Zatím nebyl přidán žádný komentář. Buďte první!

Související články:

Domino 7 for Sun Solaris 10

 (Redbooks, 11.05.2006)




Lotus Security Handbook

 (Notes/Domino R6, 19.01.2004)